This VLAN ID is never used for normal data traffic and is reserved for administrative purposes
VLAN 1
This sorting algorithm repeatedly selects the smallest element and places it in order.
Selection Sort
This type of virtualization allows multiple applications to run in isolated environments on the same OS kernel.
Containerization
This encryption algorithm is widely used for securing web traffic and is the successor to SSL.
TLS
This law states that computing power doubles approximately every two years.
Moore's Law
When data uses a dedicated path from Sender to the Recipient
Circuit Switching
This data structure supports O(1) time complexity for insertion, deletion, and access on average.
Hash Table
This technique dynamically allocates cloud resources based on demand to optimize performance and cost.
This attack involves intercepting and altering communication between two parties without their knowledge
Man-in-the-middle attack
This paradox in quantum mechanics suggests that an observer’s knowledge affects a system’s outcome.
Schrödinger’s Cat
This command-line packet analyzer, available only on Unix-like systems, allows users to capture and inspect network traffic in real time using filters based on protocols, IPs, and ports.
TCPDUMP
The programming language known for its “write once, run anywhere” capability
Java
This cloud security principle ensures that only authorized users can access and modify data.
Principle of least privilege
This type of attack involves an attacker disguising their MAC address to impersonate another device on a local network
MAC Spoofing
This was the first Pixar movie ever released.
Toy Story
This STP enhancement allows a port to immediately enter the forwarding state if it is connected to an end device.
PortFast
Kleene’s Theorem states that this type of language can be represented by both a regular expression and a finite automaton.
Regular Language
This cloud networking strategy minimizes latency by processing data closer to the user rather than in a central data center.
Edge Computing
This cryptographic hash function, producing a 160-bit output, was widely used in security protocols before being considered weak.
SHA-1
This country has the most time zones, including overseas territories.
France
This algorithm, used in CSMA/CD, determines the delay before retransmitting a packet after a collision, doubling the wait time with each failure to reduce further collisions.
Binary Exponential Backoff (BEB)
This programming concept allows an object to take multiple forms based on its context.
Polymorphism
This cloud service component acts as a reverse proxy and distributes traffic across multiple instances
Load Balancer
This standardized format is used to store and share HTTPS certificates.
x.509
This number is the only one that is equal to the sum of the cubes of its digits.
153